0 ratings0% found this document useful (0 votes) 203 views29 pagesÇhapter 1 WMN
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here.
Available Formats
Download as PDF or read online on Scribd
Basics of PCS and GSM
CHAPTER 1
Syllabus
Personal Communication Services (PCS) architecture,
Global system for Mobile Communication (GSM) Architecture, GSM frequency spectrum,
GSM radio aspects, GSM services, Supplementary services, GSM channel types, call
processing in GSM
Mobility Management : Location updates procedure, Temporary, Mobile Subscriber Identity,
concept of roaming, Location area, routing area, tracking area,
Network signalling,
Personal Communication Services (PCS) Architecture.
Introduction to GSI
Characteristics of GSM Standard .ennnee
UQ. Write the important features of GSM,
14 GSMS:
ces,
UQ. State and explain the three services offered by GSM system. 7
UG. State the various services offered by GSM standard. Describe these services in deta
LSS Se.
fency Bands .
Uo. State frequency band, channel bandwidth, access method and type of modulation used in GSM,
CSE
fications for following parameter of GSM all interface :
ua,
Forward channel frequency, 2) Frequency spacing,
Number of user per frame 4) Modulation technique [EETSSSS ERATE
y four GSM air interface specifications. [I SEN=aSe CREME
TOM Stucture. DEEEES EEE...
label diagram of GSM architecture. [SELES USCA STATA ......
architecture and write function of each block. [IT SETSeeSS TACIT...Wireless and Mobile Network (MSBTE-OW —
4.6.1. MS (Mobile Station)
Number Identities used in GSM ~
1.6.14)
4.62, BSS (Base Station Subsystem)
tions of BSC block of
reonnactions
@sM and using 8k
ich snow thelr Inte
ua, State f
1163 NSS (Network Switching Subsystem) se
Ua. Explain function of HLR and VLR: ceo —
ti [LER EES
va. Explain function of HER units. MES Te
5
Ua, State function of VLR, HLR, AUC in GsM system. RIES
‘1g OMSS Operation and Maintonance SubsySIer™
Ua, Explain function of OMC units [ESET
Ua. Describe the function of OMC in GSM Ee
4:7. Basic Rio Transmission Parameters In GSM 900.
Ua. Write GSM Air interface specification forthe following P
1. Peverse channel frequency 2 Forward channel frequency
3. ARFCN number
5. TX/AX frequency spacing
4.8 Description of Call Setup Procedures nnn fs
\Wite cal processing in celular telephone system. KITSEUERESa EMEA
ua.
Ua. Deserbe cll making procedure from mobile handset to landiine phone (PSTN) with neat timing
diagram. LES ASA
itustrate with the help of neat timing diagram, the process of call initiation from mobile handset to a
landline phone (PSTN) using timing diagram. SSED SRS CAGES
Ua, _ Illustrate the process of cal initiation from landline telephone to cellular phone with neat timing
diagram. [ESSERE ..
Ua. Describe call processing in GSM system with suitable diagram, [(USTEICSSaS3 FARNTETE
UG. Illustrate the process of cal routing in mobile. i 7
c
ae 9 communication system, SESS TNE
1.8.1. MS Registration in GSM Network.
1.8.2 Mobile Originated Cal...
yarameters |
4, Modulation
6. Users per frame FTSEu=S
ua.
VQ. Describe the call processin
9 in cellular phone fo i it
Pane 'phone for mobile originated call with timing diagram.
1.8.3 Mobile Terminated Call.
UG. Describe process of mobile terminated call
MSBTE = W-15, 3 Marks Ii
1.9 GSM Channels...
1.8.1 Logical Channels..
UQ. Draw GSM logical channel structure,
1.9.2 Traffic Channels
ul SAT
(MSBTE-New Sylabus w.ef academic year 2019-20) (06-15
)
ions ...A SACHIN SHAH Ventu®Wireless and Mobile Network (MSBTE-6th
|
1
Basics of POS and GSM
UO. Describe in deta GSM trac channels, [LSTA
UG. List and describe diferent types of traffic channels (TCHS) provided In GBM.
i AAT
4.8.3 Control Channels.
UQ. State GSM control channels, Give Siinsdbna ol al lll Pree 15.6 Marko]
‘Mobility Management
1.10.1 Paging
1.10.2 Location Update...
1.10.2(A) MS Registration in GSM Network...
4.10.3 Handover Mechanism in GSM
3.10.4 Security in GSM (Authentication and Privacy In QM) ..
1.10.4(A) Authentication using A3 Algorithm...
4.10.4(8) Data Encryption using AS and A8 Algorithm,
4.10.8 Roaming...
Network Signaling...
1.11.1 Um Interface .
1.11.2 Agg Interface ...
1.11.3 Alnterface
1.11.4 Interfaces used within NSS.
Chapter End
his chapter is divided into five parts
SBTE-New Syllabus w.ef academic year 2019-20) (D6-15) Wlrech-neo Publications ...A SACHIN SHAH Venturem
RE
SERVICES (PCS) ARCHITECTUI
(MSBTE-New Syllabus wef academic year 2019.20) (06-15)
|ON
1.1 PERSONAL COMMUNICATI
wireless access
hy sal
ivity
The term PCS refers to the numerous
vided throug!
and personal mobility services provided 1
ovide cones
terminal, This PCS system aims to provide
ge and in any form.
at any time, place and in any oo
cs veloped. Man}
are many PCS systems devel cs
a fe sd to PSTN also. The examples z
are connected to PSTN a
Fi syst for mobile),
systems are FSM (global system ae
PDC (Personal Digital Cellular), 18-95 CDMA on ;
ose
There are two most popular PCS technologies. ria
are cellular telephony, cordless and low tier
system,
-1. Tt shows PCS architecture,
Refer Fig,
Mobitty
Debase
Weng
Transport Network
Base Staton
Controle
Fig. 11.1 : The basic PCS network architecture
Generally PCS i implemented in cellular structures, In
digital cellular. ‘Systems, cell is of | hexagonal shape,
PCS consists of MS (Mobile
(Base Station), BSC (Base Station
(Mobile Switching Centre) etc,
Station), Bs
Controller), Msc
The details of the PCS architecture
GSM architecture as GSM is also
an example of PCs.
system,
are same as that of | 2,
* GSM provi,
bal System for Mobi,
stands for Glol ul
ai digital cellular technology Useq tee
ice and data services.
tis originally developed by ETSI (Bi ote
standards Institute) in Europe to lie <
roblems of the first generation networks, wees
x standardization group established in 1 M818
t common European mobile telephone standar
: ae
GSM uses narrowband Time Division Mutiny he
(TDMA) for providing voice and text baseg 'S
over mobile phone networks,
It's the first cellular system to use digital may
schemes and network level architectures,
Presently GSM supports more than on tllicn my
subscribers in more than 210 countries trough
world,
USE of SIM : GSM makes use of SN
Subscriber Identity Module) which is actualy
Storage device and it is available in the form of su
cards. It is removable and portable,
Itstores followin;
Subscriber identification umber
Subscriber's
information
home network and cous!
(iii) Private keys
Gv) User: SPecific information etc.
Prtaey of Data: All the data steams are xcvP®
; bee
7 Se MeeESSry privacy and security to the data ™
it is transmitted
OWA t0 the cellular device only.
“s improved spectrum efficiency.Wireless and Mobile Network (MSBTE-6th = IF)
ational vom
The facility of national and inte
provided.
& GSM maintains good specch quality
6 GSN is compatible wie ISDN, PSTN and otlor
ne company services
nw
DY _1.4 GSM SERVICES
UQ, State and explain the thre
“gstem Lees
$UQ. State the various services offered by GSM standard,
} «Describe these services in detail, i
DEG
GSM Services
1.Teleservices
can also be mise compatible f0 Hower services.
e-services offered by GSM {
|
Data services! Bearer services
services
Suppleme
Fig. 14.1 : GSM Services
> 1, Teleservices
© These services allows subscriber to use terminal
equipment functions for communication with other
subscribers.
«I supports emergency call services, Videotex
and Teletex services though they are not integral part of
the GSM standard,
> 2. Data services/ Bearer services
+ These services allow subscriber to transmit appropriate
signals across user network interfaces.
«It supports packet switched protocols and data rates
from 300 bps to 9.6 kbps. New developments are going
on to increase the data rate further.
+ Da
can be transmitted in two modes :
(i) Transparent mode : GSM network provides
standard channel coding method for user data.
1 UQ. State frequency band, channel bandwidth, access
UQ. List any four GSM air
Danioa of PCS and GM ..Pg. No (1,
ywarent mode 1 GSM
peclal coding methods bued on particu!
pvides
dita
wetwork p
aw
Interface,
Supple norvicen
‘There services supplements the teleservices and are
‘offered! with basle televervices.
“They are digital In nature,
‘Those services Include caller identification, call
Forwarding, cnll waiting, multiparty conversations, and
barring of outgoing (international) calls, among others,
It-also includes SMS (Short Messaging Service) service
is u toxt messaging service that allows sending and
receiving text messages on your GSM mobile phone,
Some of the supplementary services examples are :
(i) Callconferencing (ii). Call waiting
(iii) Call barring (iv) Call forwarding
(vy) Number iden
(vi) Advice of charge (ii) Closed user groups
> 1.5. GSM FREQUENCY BANDS
method and type of modulation used in GSM, i
MSBTE - S-15, 4 Marks [i
| UQ. State specifications for following parameter of GSM {
air interface :
1) Forward channel frequency,
2) Frequency spacing,
3) Number of user per frame
4) Modulation technique {
terface specifications, i
MSBTE - S-18, 3 Marks
It's frequency and time division system.
Each physical channel have unique frequency and time
slot number.
GSM Triband frequencies are 900MHz, 1800MHz
and 1900MHz. They are generally referred as GSM
900 and DCS 1800 systems.
(MSBTE-New Syllabus w.ef academic year 2019-20) (06-15)
[al rech-Neo Publications ..A SACHIN SHAH Venturecn a ae
1710-1785 Miz —~
Parameter, CO He
390-915 1805-1880MHz
Sr.No.
1.__ | Uplink frequency He
935-960 K
2 y 75 MH
2. ‘Downlink frequency 35 MHZ Iz.
3,__| Bandwidth
te
Carrier spacing. [isn
45 MHz,
Duplex channel spacing
Number of time slots used pet channel [8 ey Sa
Wavelength = 33cm
9, _| Transmission Data rate 270 kbps 270 kbps
10.__| Maximum BS power 55.dBm 43 dBm
U1, | MSclasses 1.20 W (not implemented) T- 1 W (handheld)
11-8 W (catftransportable phone) | TI- 0.25 W (handheld)
Ik 5 W (carftansportable phone)
IV-2.W (handheld)
V-0.8 W (handheld)
pi 1.6 GSM ARCHITECTUI
UQ. Sketch GSM TOM Structure,
UQ. Draw label diagram of GSM architect
UQ, Draw the GSM architecture and write
UQ. Explain GSM radio subsystem,
. -
Weicesra ne
‘(Cescrsteoo
Refer Fig. 1.6.1.
Pubite
networks
BTS : Base Transceiver Station
ee : Visitor Location Register
AUC : Authentication Centre ALR:
: Home Lo
EIR: cation Register
aie Equipment Identity Regist?
ech.
0 Publications ..a SACHIN SHAH Ver™*Wireless and Mobile Network (MSBTE-th ~ IF)
Basics of PCS and GSM ...Pg. No. (1-7)
‘© GSM architecture shows various functional entities and
three main subsystems.
1, BSS : Base Station Subsystem
2, NSS: Network and Switching Subsystem
OSS : Operational Subsystem
# MSis also a subsystem, but generally considered as an
integral part of BSS.
«The BSS is also known as radio subsystem interlinks
and manages links between MS and NSS. It is
comprised of many BSC (Base Station Controllers).
«NSS controls all the switching functions of the system,
It also supports communication between MSCs (Mobile
Switching Centre) with other networks like PSTN
ISDN etc.
‘© OSS manages operation and maintenance of GSM. It
also administers the monitoring and controlling
operations in the system, Actually in GSM interaction
between the subsystems can be categorized
1. Operational: Provides transmission and
reception paths between NSS, BSS, MS and
subscriber.
2. Control : Manages all the traffic handling
activities of the operational part and maintains,
‘modifies and controls the traffic related functions.
«Refer Fig. 1.6.2 which shows interconnection between
various subsystems. These subsystems are explained in
1. BTS
‘© It consists of an antenna equipment responsible for
transmission and reception of radio signals. Generally it
uses directional antennas.
* The transceiver (TRX) is the central unit of the BTS. It
manages links between maximum of 8 MSs with the
use of single pair of frequencies. (8 MSs are handled at
the maximum because in GSM, each cartier is divided
into 8 time slots).
It also has very important device known as TRAU
(Transcoder Rate Adaptation Unit). TRAU performs
encoding and decoding of the speech and rate
‘adaptation funetion of the data.
Multiple BTSs are connected and controlled by BSC.
Some of the BT'Ss are co-located at the BSC and others
buted and physically connected
rowave links or may be
may be remotely di
to the BSC with the use of
by dedicated lease lines.
2. BSC
tis a high quality switch. It controls several typically
hundreds of BTSs. The mobile handovers between two
BTSs which are under control of the same BSC are
handled by the BSC itself and not the MSC. This
reduces burden on the MSC.
It provides cell configuration data and control of RF
power levels in BTSs.
‘The BSC assigns free radio channels in the TRX for the
link to the mobile station.
BSC is also responsible for maintaining the radio path
‘between MSs during the call and disconnection of the
path when the call'is over.
xxplain function of HLR-units. “
MSBTE - S-16, S-17, W-17, 1 Mark
BSS forwards the signals to NSS.
It consists. of main switching functions, various
databases and mobility management units.
It manages the communication between GSM network
and users from other networks like PSTN.
The main unit of NSS is MSC (Mobile Switching
Centre). ;
Funetions performed by MSC are :
1. All the necessary switching functions required by
MSs located in MSC area are performed by MSC.
(MSBTE-New Syllabus wef academic year 2019-20) (D6-15)
[Bl rech-neo Publications ..A SACHIN SHAH Venture2, VLR
BT
Wireless and Mobile Network (MSBTE
= the database of local
1 subscribers When
ommunicates with other MSCs i
2 Mc + his opus
il rs the
network, s like subscriber enters ; as aan
3, It also communicates withthe other networks svpsaer te amine MS © te MSC a
| Bie * ndergoes repistrtion process es follows.
ae ntifies that MS belongs to other Msc
4. Tt always tracks the location of the sul
ve i ide
that to camy out the necessary handover @ VLR
area.
inl idemtifies and communicates with Mg,
Sear wee mcs (ii) VLR then identifies an
6. Call routing functions and echo control functions
are also performed by MSC.
«There are five functional entities associated with the
MSC. They are :
HLR : Home Location Register
VLR : Visitor Location Register
EIR : Equipment Identity Register
HLR in its home network.
(i) VLR constructs the GT (Global Title) from IMs
0 that it can allow communication between VLR
and Home HLR. :
(iv) VLR generates. MSRN (Mobile Subscribe,
Roaming Number) to allow MS to use the network
when in roaming. 2
(v) MSRN is sent to home HLR also.
AUC: Authentication Centre
GMSC : Gateway MSC
VLR stores :
(i) MSRN Gi) TMSI
(iii) Home location of the MS
> 1 ALR
* HLR is the database of permanent subscriber Gv) Supplementary services data of MS
information. (vy) MSISDN (vi) IMSI
* It contains user information like address etc., account (vii) GT
status and preferences, (viii) Local MS identity if used
* There are two types of information stored in HLR,
VLR works in associati
Te Saieeie ‘sociation with HLR and AUC,
boas
2. Mobile information a
{is the database of all the legitimate, fraudulent and
faulty MSs. It keeps track of all the valid and invalid
mobile equipment in the area,
* Tt stores IMEI provided by the
Functions performed by HLR are :
1. Identification : It stores IMSI and MSISDN
(Mobile Station International Subscriber
Directory Number) are used in call routing equipment
m
between MSC and particular MS. Using these eee
‘unique numbers particular MS js identified, > 4 auc
2. Subscriber service provision ; It ° Wis
+ It provides 's the database that contains
i se
information about the offered services like Keys for each subscriber and if eee
teleservices, bearer services or suppl ‘ates security
plement Telated paramet
services. otf ie ters for Protection Purposes,
3 VLR address + It is needed when MS is in
roaming, These are temporary data, tt aten | « .
provides cipher keys, eo For carrying out authentWireless and Mobile Network (MSBTE-6th — IF)
Basics of PCS and GSM...Pg. No. (1-11)
> 5. GMSC
«All the calls to the GSM network are routed through
GMSC. It first identifies the right HLR and
authenticates it
other networks and provides
© Ttalso communicates
gateway function for external network communication
with GSM network,
YB 1.6.4 OMSS : Operation and Maintenance
Subsystem
UQ. Explain function of OMC units,
1 1.7 BASIC RADIO TRANSMISSION
PARAMETERS IN GSM 900.
JQ. Write GSM Air interface specification for the following :
parameters:
41, Reverse channel frequenc
2, Forward channel frequency
3, ARFCN number
4, Modulation:
5, Tx/Rx frequency spacing a
6 Wena
as
Table 1
Fi
technicians.
elements.
PST | Puan T specticnions
UQ. Describe the function of OMC in GSM. :
SITECETAENIST || Forward channel frequency | 935 ~ 960 MHz
There are three functional entities mainly in OMSS. Reverse channel frequency | 890-915 MHz
Functional Entities in OMSS ARFCN Number 0 to 124 and 975 to 1023
Tx/ Rx Frequency spacing | 45 MHz.
Fe 5
eal meneoemen oyna ‘Tx/Rx Time slot spacing _| 3 Time slots
2. Configuration management ayetem Modulation Data Rate 270.83 kbps
3, Software management system Frame period 4.615 ms
1.6.5 : Functional Entities in OMSS Modaltion 0.3 GMSKS
> 1. The Fault Management system ‘Users per: finan: .
It invokes alarms from the BSS elements when faults || Time slot period 576.92 us
‘occurs, These faults are then resolved by software or by || Channel spacing 200 kez
yi as cannot eee Interleaving delay(maximum) | 40 ms
+ This functional unit is for installation and maintenance || Voice Coder Bit Rate 13.4 kbps
of the software of the newly setup BSS network || Reverse and Forward Channel | 25 MHz
Bandwidth
‘© It also manages hardware inventory list and changes |{~
operation parameters like frequencies of BTS etc. Bit period 3.692 ps
> 3, ‘The Software Management system Frequency deviation 67.708 kHz.
‘This functional unit is used to install new software or || Slow frequency hopping 217 hops per second
updates and manages the software inventory lists.
(MSBTE-New Syllabus w.ef academic year 2019-20) (D6-15)
[Bal rech-Neo Publications A SACHIN SHAH VentureNetwork (MSBTE-6th IF)
f call
L SETUP Illustrate the process oF
mre SEU Ge | felephone to cellular phone with neat timing diagram,
i
Ua. Describe call processing in GSM systern vith suitable :
diagram, MSBTE - S-17, 4 Marks
Ug. Illustrate the process of call routi
Eee La 6 Marks
UQ. Write call processing in cellular telephone system.
1. Describe call making procedure from mobile handset |
to landline phone (PSTN) with neat timing diagram.
i TSCA | be divided in three different parts.
1. MS registration in the GSM network
2. Mobile originated call
3, Mobile terminated call
VQ, Mlustrate with the help of neat timing diagram, the
process of call initiation from mobile handset to. ;
landline phone (PSTN) using timing diagram.
2A 1.8.1 MS Registration in GSM Network
Refer Fig. 1.8.1, it shows typical flow diagram of MS registration in the GSM network.
He ee ee es
Channel
eewest, | channel
[_enRACH | Tequest
Channel
command
Activation
acknowiedgment
socon | SOCCH
assignment |,_essignment
Location
Update request! Location
CTMSTLAIy “| UPdate request | Location
) update request Location
voor ES sn reaen
User a
authentication | *t#hentication | authentication IMSI and user
[ata request |, data reauest |, data request }eCata request
Ms
User
Authentication
Authentication parameter comparison Senet
and new LAl and Tista
Acknowldgement
‘ssignment
1 new LAL and TMS?
}—_S2C0H lease ee
wease|
cae :Wireless and Mobile Network (MSBTE-6th
When the mobile is switched on it first looks for the
cartier on which BSS is transmitting the broadcast
channel. This is done by measuring the received power
of all 124 carriers present in the GSM system. This ts
because carrier containing broadcast channel is
transmitted at high power compared to others
Next MS finds TSO of broadcast channel so that it ean
identify FCCH burst. Then in TSO of the next frame
MS finds out Synchronization burst for identification of
BSIC and REN.
MS decodes information carried by BCCH, It contains
neighbouring cell identification, cell global identity
(CGI: a sequence consisting of country coxle, mobile
code, location area code, cell identity etc.) the number
of common control channels avaitable in the cell, the
maximum power that ean be used during call set up
process etc. this finishes passive activation of MS
If the Location Area Identity (LAI) sent by BS differs
from the latest one which is stored in MS then
registration takes place. Location updating is also
necessary for monitoring MS"s current location,
MS registration process
‘Once the mobile is switched ON, it sends the channel
request on RACH required for registration process to
BSC through BS.
BSC commands BS to allocate free SDCCH. BS
acknowledges this command and informs MS about
this SDCCH on ACGH.
‘MS now uses SDCCH to send location updating
request to BS. This request contains type of location
update required, TMSI and LAI. This request is carried
to VLR through BS-BSC-MSC-VLR.
If the user's TMSI already exists in VLR, it updates his
data about his activity. If the TMSI is not available
with VLR then LAI sent by user is decoded, his IMS
and data required for authentication is identified with
the help of last VLR served, But if previous VLR also
does not have necessary parameters then MSC request
MS to send IMSI on SDCCH. Once it is received VLR
communicates with home HLR and MS is
authenticated. Now this information is updated in VLR.
After this new user parameters are set. They are TMSI,
LAI. These parameters are updated in HLR and VLR.
Acknowledgement from the MS is then received.
SDCCH channel is then released and now MS is ready
for call set up.
(MSBTE-New Syllabus w.ef academic year 2019-20) (D6-15)
Basi
YW 1.8.2 Mobile Originated Call
UQ Describe the call processing In cellular phone fo
mobile originated call with timing diagram.
‘© Fig, 1.8.2 shiows mobile originated call to PSTN. After
rogistration once the MS is allocated with SDCCH, MS
issues CM. (Connection Management) request to MSC.
‘This consists of the type of service MS wants to
invoke.
© Once the CM request is received based on location
update information, if needed MSC will invoke
‘authentication process.
‘* Upon reception of authentication response from MS,
MSC starts ciphering of voice and data for encryption
‘and decryption purpose. For this MSC passes cipher
key (Ke) to BSS. BSS then instructs MS to start
ciphering,
‘+ MS then generates cipher key (Ke) independently and it
is not sent on air. Only information regarding
completion of ciphering at MS is sent to MSC through
BSS.
‘+ Now MS sends call setup request to MSC. This request
contains all information required for call set up like
dialled number etc.
© Upon reception of all the required necessary
information by MSC, it sends MS a call proceeding
message.
After that connection circuit between MSC and MS is
freeze by sending the assignment request by MSC to
BSS.
‘© BSS then send assignment command message to MS
and instructs it move from SDCCH to TCH. FACCH
will now carry all control signals hereafter.
© MS sends assignment complete message to MSC
through BSS indicating that it has moved to TCH.
© Once MSC receives assignment complete message, it
sends IAM (Initial Address Message) to PSTN
network,
* PSTN then sends ACM (Acknowledgement Message)
indicating that destination phone is ringing,
‘© This is informed to MS by alerting message.
* Once the called party picks up the phone ANM
(Answer Message) is sent to MSC. MSC initiates
connect message to MS and MS respond this by an
acknowledgement,
+ Now the call is set up.
Tech-Neo Publications ...A SACHIN SHAH VentureBasics of PCS and GSM
i a &
VLR
:
(S0CCH)
CMsorice request |__|
{service typeof mobile | Complete ayers nfo
originated call) (CM service request)
‘Authentication request
‘Authentication (Cipher key KC)
response [—_____|
+} Cipher mode command
gm
commana
peng ode
compete | phernads compe
i
Sep dado)
I Call proceeding
Moca TCH an ron quae
[Aas commana
[Asonmen compete”
tus oven Yes) |
"sigan compe
Tha
{ea adtess messoe)
iz : ACM
Alerting acknowledgment message)
i“ /ANM
Connect {answer message)
Coneet acknonage
Fig. 182 : Mobile originated call
%® 1.8.3 Mobile Terminated Call
TAM (nitial Address Message) is received by GMSC. This IAM contains MSISDN (Mobile Station ISDN Number
which means the Directory Number) ofthe called paty
(MSBTE-New Syllabus w.e.f academic year 2019-20) (06-15) (rech-neo Publications ...A SACHIN SHAH Venture:Wiel
and Mobile Network (MSBTE-6th
)
* Once HLR receives MSISDN then it retrieves
(Provide Roaming Number) request along with IMSI to the MSC, MSC then allocates MSRN (Mobile Station
Roaming Number) form the available pool, MSRN is temporary number. MSC sends it (o GMSC through HLR.
Basics of PCS and GSM ...Pg. No. (1-15)
IMSI of that subscriber and forwards the PRN
_
5 oe w& &
BSS. GMSO |
MS VLR fe) i
Cs
—____| TAM
—a
SAS AR (MSAN))
Spa
aoe
a,
Paging response Complete layer 3 into
(paging response)
Ciphering Mode command
f ‘Setup
coool
Assignment complete |
|
2 ACM ACM |
a
Connect Acknoledge
rita ean amd cl
Tal rech-Neo Publications ....A SACHIN SHAH Venture
(MSBTE-New Syllabus wees academic year 2019-20) (D6-15)41.9 GSM CHANNELS
"= Types of channels
the allocated
M_ with
ied to the pool.
ja BSS using PCH.
ion area to which
Now GMSC forwards the TAI
MSRN to the MSC. MSRN is return
MSC sends paging request to MS vi
This paging request contains local
subscriber belongs.
paging request MS requests for
In response [0 that immediate
done by BSS. And now MS
d then sends the paging
After receiving the
channel on RACH.
assignment of channel is
moves to allocated SDCCH an‘
response to MSC through BSS.
MSC the commands for cipherin
1g. MS receives this
's Ke on its own and send cipher complete
and generates
command to MSC through BSS.
Then MSC generates set up message wh
calling party's number and bearer capabilities etc.
MS generates call
jch contains
Upon reception of set up message,
confirmed message which indicates that it has all the
necessary information required for the call
As soon as MSC receives call confirmation message, it
starts assignment process. It comprises of assignment
request message from MSC to BSS and allocation of
TCH by BSS to MS. Hence further Signaling will be
using TCH and FACCH.
‘Once MS is moved on TCH it starts ringing, and sends
the alerting message to the MSC. MSC then forwards
acknowledgement message (ACM) to the PSTN via
Msc.
Once the called party picks up the phone, connect
message is given by MS to MSC and then MSC sends
ANM (answer message) to PSTN to which PSTN
responds by connect acknowledge message. Then call
is established.
(1). Physical channels
(2) Logical channels
1.9.1: Types of GSM channels
Fig.
«= physical Channels
‘The combination of ARFCN and TS (time slot)
known as the physical channel for GSM.
One RF channel will support eight physical channelsj
time slot zero (TSO) through seven (TS7).
Each physical channel can be mapped into differe:
logical channels.
‘This can be done at different times i.e. specific tim
slot or frame may be used to carry traffic data, contr
data or signalling data.
%_1.9.1 Logical Channels
5F Two types
1, Traffic channels
2. Control channels
GSM logical channels
eee I
a Control channels
(ccH)
Full rate Halfrate Broadcast Common Dedicated
control. control contol
channel channel channel
Fig, 19.1(a) : Types of GSM logical channels
(MSBTE-New Syllabus we,f academic year 2019-20) (06-15)
&) Tech-Neo Publications ...A SACHIN SHAH Ventur®Wireless and Mobile Network (MSBTE-6th — IF)
GSM Logical channels
Traffic channels
Broadcast
channels,
Fullrate Hall
TCH = TCH
ate
te |
BCCH FCCH SCH
Basics of POS and GSM ...Pg. No. (1-17)
Signalling channels
Common Dedicated
control control
channels channels
Downlink Uplink Slow Fast
PCH AGCH RACH SACCH SDCCH FACCH
TCHIF : Traffic channel full rate
BCCH : Broadcast control channel
‘SCH : Synchronization channel
AGCH : Access grant channel
SACCH : Slow associated control channel
FACCH : Fast associated control channel
FCC!
‘TCH/H : Traffic channel half rate
: Frequency correction channel
PCH : Paging channel
RACH : Random access channel
SDCCH : Standalone dedicated control channel
Fig, 1.9.2 : Logical Channel structure of GSM
% 1.9.2 Traffic Channels
UQ. Describe in detail GSM traffic channels. &
Ce -
UQ. List and describe different types of traffic channels |
(TCHS) provided in GSM.
«They are used to carry user data or speech on forward
and reverse links.
‘Speech [— Full rate (22.8 KB/s)
L_ Half rate (11.4 KB/s)
Trafic channels — i
(cH) [— 9.6 KB/s
nd 4.8 KB/s
_ 2.4 KBis
Fig. 19.4: Traffic channel structure
> — @ Full rate traffic channels
‘+ Formats and the frame structures used on both the links
al ‘User data is transmitted within one TS per frame,
ns ai
+ TCH data may not be sent in TSO time slot as it is | * 26 frame of TDMA frame is zero if TCH full rate is
reserved for control signalling data. used. TCHI/FS (full rate speech channel)
* They can be further categorized as eels
© Fullrate traffic channels 1 Tuite L9.1 s Types of fll rate TCH
©. Half rate traffic channels St (Name of the ful | Type ot sana pera)
No.| raleTCH | camled |
1. |(TCHIFS) full rate|Digiized —user| 22.6kbps with GSM
speech channel | speech encoded| channel coding addon
()) Full ate (TCHIF) at 13kbps
2 /(TCHF96) Ful rte] Userdata | 22.8 kbps with FEC
(i) Half rate (TCHIH) data channel for 2.6 (forward Error Correction)
Fig. 1.9.3 : Types of traffic channels eS ees eneon Gee
(MSBTE-New Syllabus w.e academic year 2019-20) (D6-15)
Brech.neo Publications ...A SACHIN SHAH VentureBasics of PCS and GSM ...Pg. No. (1-18)
sTE-6th = IF)
Data rate
Wireless and Mobile Network (MSS
| Name ofthe full | Type ct sional
No.| rate TCH cared
3. | TOMS, Ful rte | Use data
data chanel or 48 (Foard Err Corcton)
[sos coding ation to. GSM.
lee
a Tironea) Fura] user data |228Kbps win FEC
(Forward Eror Correction)
data channel for 24
iss coding action to GSM.
we 19.5 Control Channels
UQ, State GSM control channels, Give functions of each
208 Kops with FEC
(A) Broadcast control channels
(B) Common control channels
channels
(C) Dedicated control
> Gi) Half rate traffic channels
> (A)Broadcast Control Channel (BCCH)
# Userdata is mapped on the same TS (time slot) but sent
rent frames.
It is forward control channel with time slot Tso
. 2 allocated to it.
« Itis simplex channel and its functions are =
Table 1.9.2 : Types of half rate TCH
© Itserves as beacon channel to locate nearby mobile.
Ss. | Name cf the halt | Type of signal Data rate - a izatic i
[t
Es nae ‘©. It provides synchronization for all MS in same cell.
a © Rarely monitors for received power of MS that belongs
} 4 | (TCHHS) Half rate | Digitized user | 11.4 kbps with GSM to neighbouring cells so that handover decision could
|| smecnehanel | spect channel coding be taken.
| encoded at addition 7
© Three types : Refer Fig. 1.9.5.
| | ea types : Refer Fig. 1.9.5.
|
2 | (TOHHE.8) Halt | User data 11.4 kbps with FEC
| rte data channel (forward error
| | tor A8kbps correction) coding
| adtition to GSM
3. | (TCHH24)Hal | User data 11.4 kbps with FEC
ate data channel. (forward error = i
for 2.4 kbps correction) coding errno
dation to GSM j
Fig, 19.5: Broadcast channel structure
Control multitrame = 51 TOMA frames.
a — 235 ms
2/3) 415]6]7]e[o[to}1}t2)ta)ta]
S]s}sjelelciclclclelslelcle
: FOCH burst (@CH)
SCH burst (CH)
BCCH burst (BCH)
= PCHIAGCH bu
ile rst (COCH)
=omon[a oe
(a) The cont
) The control channel multi-frame for forws
Fig. 1.9.6 Contd... v4 link TS0
lew Syllabus wee academic year 2019-20) (06-15)Wireless and Mobile Network (MSBTE-6th — IF)
Control multiframe = 51 TOMA frames,
Basics of PCS and GSM ...Pg. No. (1-19)
235 me
6
R
t]2]s]4]s
Alri Ri RIA
R
R:: Reverse RACH burst (CCCH)
(b) The control channel multl+frame for reverse link TSO
Fig. 19.6
© Broadcast control channel (BCCH)
© Frequency correction channel (FCCH)
* Synchronization channel (SCH)
+ BCCH data provides inform:
© BCCH data contains :
L
n needed to set up call
Call and network identity
2. Operating characteristics of the cell (current
control channel structure, channel availability,
situation of congestion).
3. _ List of currently engaged channels in the cell
+ Refer Fig. 1.9.6(a) and (b), it shows the control channel
frame for forward and reverse links.
* Frame 2 to frame 5 carries BCCH data on forward link,
Frequency correction channel
‘© It occupies first frame in TSO and it is repeated after
every 10 frames in control channel multi-frame.
‘+ Itcarties the frequency information so that mobile unit
can synchronise its local oscillator’s frequency with
the base station frequency. Fig. 1.9.7 shows typical
FCCH burst.
carting =
Tall Gyod bit soquatan See es Tall aru
Be | Petttooumres TTS Se
3 142 3 825 =158.25 le
Fig. 1.9.7 : FCCH burst
© synchronization channel (SCH)
* Ittakes the next to FCCH frame position in the control
channel multiframe time slot TSO. It is sent once after
every ten frames in control multiframe.
* It provides signalling data useful for synchronism
between MS and BS.
(MSBTE-New Syllabus w.e academic year 2019-20) (D6-15)
© The frame number (FN ranging from 0 to 2715647)
‘long with Base Station Identity Code (BSIC) is sent in
SCH burst, BSIC is unique for each BTS.
© When the mobile unit is far away (maximum 30 km)
from the BS, it becomes necessary to adjust its clock
with the BS clock to reduce timing errors and SCH
burst signal is used to carry this information. Fig. 1.9.8
shows SCH burst.
i rel |Geara Bi
[Bt [eas
:
Fig. 19.8 : SCH burst
> (B) Common control channels
© Itoccupies TSO of every GSM frame.
* There are three types of CCH. Refer Fig. 1.9.9.
Types of Common Control Channels
(}) Paging Channel (PCH)
(ii) Random Access Channel (RACH)
(i) Access Grant Channel (AGCH)
Fig. 1.9.9; Types of control channels
> (i) Paging channel
* It is used to provide paging signals from BS to all MS
in the cell.
© It carties the notification information regarding the call
originated from PSTN,
* The paging message is generated by IMST of the target
subscriber and the acknowledgement request from the
‘mobile unit which is sent on RACH on reverse link.
+ It may carry the cell broadcast ASCII text messages to
all the subscribers when used in SMS feature.
[ea rech.neo Publications A SACHIN SHAH Venturea
Wireless and Mobile Network (MSBTE:
(i) Random Access Channel (RACH)
Iti reverse link channel and occupies TS0 of the GSM
frame and caries acknowledgement messages. by
‘mobile units
It also carries the call set up requests generated by
subscriber units. Access scheme used by RACH:
slotted ALOHA.
At the BTS cach frame will accept the RACH
transmissions from the mobiles during TSO.
The base station responds to the RACH transmission by
allocating a channel and a Stand-alone Dedicated
Control Channel (SDCCH) for signalling in the
presence of a call. The connection is confirmed by the
base station over the Access Grant Channel (AGCH).
‘The RACH burst has longer guard period to protect for
burst transmission from Mobile station that does not
mow the timing advance when it first accesses the
system.
The additional guard time allows @ distance upto 35 km
between base station to mobile station. Fig. 1.9.10
‘shows the Random access burst.
+} tss2s te
a
Tai Syreronizaton | Coded | val) [Adon Ua
bts | "sequence | Data'| ots |e tie
3 ai a rer
(0.577 ms)
Fig. 1.9.10: Random Access Burst
(iii) Access grant channel (AGCH)
‘The AGCH is used by the base station to provide
forward link communication to the mobile. It carties
data that instructs the mobile to operate in a specific
‘channel with a particular dedicated control channel,
Ik is the message sent by the base station before a
subscriber is moved off the control channel,
‘The AGCH is used by the base station to respond to
RACH sent by the mobile station in the earlier CCCH
frame.
(C) Dedicated Control Channels (DCCHs)
‘The Dedicated Control Channels (DCI
picture after a call is established, The d
channels are bidirectional,
Hs) come into
ledicated contro}
Year 2019-20) (06-15)
J the reverse link:
ere are three different dedicated control channel,
Th
‘They are :
‘of Dedicated Control
a ‘Channel
alone Dedicated
(Sent Channel (SOCCH) |
{ll Slow Associated Control
‘Channel (SACCH)
(li) Fast Associated Control
‘Channel (FACCH)
Fig, 1.9.11 : Types of Dedicated Control Channels
() Stand-alone Dedicated Control Channels
(spccH)
The Stand-alone Dedicated Control Channel (SDCCK)
is allocated for every mobile station.
It contains the signalling data that follows tte
connection of the mobile with the Base Station (B9),
prior to the allocation of TCH by the Base Station (Bs)
to the MS,
It guarantees that the Mobile Station (MS) and bas
station (BS) will remain connected, The Base Station
and Mobile Switching Centre will verify subscriber
unit and assign the needed Tesources to the mobile.
This channel that accepts the newly completed call
from the BCH. It holds the traffic while waiting for the
base station to assign a TCH channel,
‘The SDCCH is also used to transmit authentication and
alert messages as the mobile synchronizes. itself with
the frame structure and waits for TCH.
SDCCHs can be assigned their own physical channel
Also they can occupy the TS0 slot of the BCH if thet
is low demand for BCH or CCCH traffic
® Slow Associated Contro! Channel (SACCH)
{tis elated to traffic channel ot SCCH
On the forward Tink it is
changing information like :
0 Send regularly
1 Seat Felirs 4
° Transmit power level, i :
si82K
o
© Specific timing advance instructions for each uset- |
TS aeasimessges,
'€0 Publications ...A SACHIN SHAH Venture
(Wireless and Mobile Network (MSBTE-6th — IF)
On the reverse link
carries information about
© Received signal strength,
© Quality of TCH and BCH
© Measurement results from neighbouring cells,
It is used to inform the base of power measurements
mode by the mobile of signal strength in the adjacent
cells,
It is transmitted during the 13" frame (and on the 26"
frame when half rate traffic is used) of every dedicated
control channel multi frame.
SACCH exchanges control information between base
station and mobile station during a call or call set up.
(ii) Fast Associated Control Channels (FACCHs)
FACCH carries important messages. It is used for
exchange of time critical information between the
mobile and the base station during the progress of the
call.
‘The FACCH is assigned whenever SDCCH is not
dedicated to a user and there is an urgent message like
hand-off request.
‘The FACCH transmits control information by stealing
capacity from the associated traffic channel. It is done
by setting two special bits called stealing bits. In the
TCH forward channel burst.
If a stealing bit is set, the time slot contains FACCH
data for that frame.
RPE ara
DH 1.10 MOBILITY MANAGEMENT
SE ia
Basios of PCS and GSM ...Pg. No. (1-21)
Mobility management in GSM can be categorised in 4
sections namely paging, location updates, handoff
mechanism and roaming.
1101
1.10.2
Paging
For mobile terminated call, location of the mobile is
important. This is done with the paging process,
‘The paging message is sent to the MS by BSS via
paging channels. It includes the IMSI number. This
‘message may include the information regrading the
channels the MS needs in case of the call.
To optimize the cost and response time the paging
starts at the location of the MS which is recorded in
HLR. This location is continuously updating. For this
location tacking various algorithms are present.
Location Update
It is important in finding out the location of the
powered on MS in GSM network.
In case of mobile terminated calls or SMSs, it is
important. This location information is stored within
the HLR and VLR.
‘When the MS is in OFF condition, explicit IMSI detach
does the work of location update. IMSI detach is
similar to HLR data. If the MS is out of coverage area
implicit IMSI detach helps in location information
update,
(MSBTE-New Syllabus we academic year 2019-20) (D6-15)
[Bl rech.weo Publications ..A SACHIN SHAH VentureBasics of PCS and GSM No, 1.
W® 1.10,2(A) MS Registration In GSM Network
ec 0 ws typical flow diagram of MS registration in the GSM network.
Refer Fi 1, it shows typical flow diagram of MS registration
ig. 1.10.1, it shows typica
‘Authentication parameter comparison
us ors ase]
Channel
request Channel
en RACH request
Channel
sclvation
command
‘tivation
acknowledgment
‘sDoCH
assignment
Nooaten Tas
update request] Location = L
anon request cation
(TMSI,LAD, | update request, update request update request.
User eet von | IMStand user
User | authentication | authentication | "ata request
authentication | “data request |, data request feat reauest_|
ata request lessiareern |
Inst
User
Authentication
HLA
Parameters
and dw LAL and TMSI assignment
Acknowidgement new LAI and TMSI
SOCCH release
(coraFig. 1.10.1 : MS registration in GSM network
1. When the mobile is switched on it first looks for the
carrier on which BSS is transmitting the broadcast
channel. This is done by measuring the received power
of all 124 carriers present in the GSM system. This is
because ‘carrier containing broadcast channel ig
transmitted at high power compared to others,
2. Next MS finds TSO of broadcast channel so that it can
identify FCCH burst. Then in TSO of the next frame
MS finds out Synchronization burst for identification
of BSIC and REN,
3. MS decodes information c:
neighbouring cell identification, cell global identity
(CGI: a sequence consisting of country code, mobile
code, location area code, cell identity etc.) the number
of common control channels available in the cell, the
maximum power that can be used during call set ¢
Process ete this finishes passive activation of Mg
ied by BCCH. It contains
(MSBTE-New Syllabus
4. If the Location Area Tdentity (LAN) sent by BS diff
from the latest one which is stored in MS th
‘eeistration takes place, Location updation is a
necessary for monitoring MS"s current location.
co
MS registration process
Once the mobile is switched ON, it sends the chant
pauest on RACH required for registration proces
BSC through BS.
BSC commands BS to allocate free SDCCH. 8
acknowledges this command and informs MS abo
this SDCCH on ACGH,
MS now uses SDCCH to send location pda
Fequest to BS. This request contains type of locati
Update required, TMST and LAL This request is ca
BS-BSC-MSC-VLR.Wireless and Mobile Network (MSBTE-6th —IF)
Basics of PCS and GSM ...Pg. No. (1-28)
‘Ifthe user's TMSI already exists in VLR, it updates his
data about his activity. If the TMST is not available
swith VLR then LAI sent by user is decoded, his IMSI
and data required for authentication is identified with
the help of last VLR served. But if previous VLR also
does not have necessary parameters then MSC request
MS to send IMSI on SDCCH. Once it is received VLR,
communicates with home HLR and MS_ is
authenticated. Now this information is updated in VLR.
‘© After this new user parameters are set, They are TMSI,
LAL These parameters are updated in HLR and VLR,
Acknowledgement from the MS is then received.
‘© SDCCH channel is then released and now MS is ready
for call set up.
Handover Mechanism in GSM
TGQ. Explain various types of handoffs in GSM network.
GQ. What are the different types of Handover in GSM ?
Explain in detail Intra-MSC handover,
GQ. Discuss various types of Handoffs in cellular networks
BW 1.10.3
«There are two basic reasons of the requirement of
handovers..
1. The MS moves out of range of BTS and hence received
signal level decreases. The error rate may increase due
to increased interference. This will degrade the quality
of the radio link.
> 1. Intra-cell handover
‘This handover is performed to
If the traffic in one cell is too high then some MSs may
be shifted to other cell if possible. This is known as
load balancing,
MS regularly performs check of 16 strongest carrier
transmitting the BCCH. Out of this six strongest
catriers are transmitted to currently assigned BS after
every 0.48 seconds, BS also checks for the interference
levels of the free time slots. OSS subsystem monitors
the current traffic loads of the cell.
‘These are the measurement values which are used in
handover mechanisms in GSM.
‘Typically it is expected that handover should finish in
cone second, If the handover error occurs the connection
is overtaken by previous BS.
This section refers to typical situations of handovers in
GsM
‘Situations of handovers
ings
1. Intra-cell handover
2, Intra-cel,intra-BSC handover
‘3 Inter-BSC, Intra-MSC handover
4, Inter MSC handover
it
e15Fig. 1.10.2 : Situations of handovers in GSM
optimize the traffic load and to improve quality of the connection. Within a cell,
transmission at certain carrier frequencies become impossible due to narrowband interference and hence carrier
frequency is changed i.e. handover is performed for improvement, Refer Fig. 1.10.3.
BSC he 12
Bsc}!
BSC MSC
BTS
(6816Fig. 1.1033 : Intra-cell handover
(MSBTE-New Syllabus w.e.f academic year 2019-20) (D6-15)
[a rech-Neo Publications ..A SACHIN SHAH Venturebile Network (MSBTE-6tN —
Wireless and M
2
When the MS moves from one
to another cell but both the
of same
Intra-BSC handover
Inter-cell,
cell
cells are under control
BSC then this type of handover is
performed and MS is allocated
with new carrier in new cell.
Refer Fig. 1.10.4.
gornFig. 1.104 Inter-cell, Intra-BSC handover
> 3, Inter-BSC, Intra-MSC handover
This is performed when mobile moves from one eell to another which are under control of dif
MSC. Refer Fig. 1.10.5.
fferent BSCs but sa
(so1aFig. 1.10.
Inter-BSC, Intra-MSC
> 4, Inter MSC handover
This is performed when MS is mi from one MSC area to dint for
ioving fi
pe rom one MSC area to another. In this situation both the MSCs hi rf
. as to per
(S19 ig. 1.10.6 : Inter MSC hand,
(MSBTE-New Syllabus w.ef academic year 2019-20) (06-15)
Tech-Neo Pu
iblications
~A SACHIN SHAH VentureJess and Mobile Network (MSBTE
IF)
DB 1.10.4
Security In GSM (Authentication
and Privacy in GSM)
GQ. Write short notes or
GSM.
Authentication and privacy in.
GQ. Explain in detail how Subscriber Authentication is
done GSM.
* Inany of the digital cellular systems, security provision
is relatively easy compared to analog systems. Methods
like encryption, scrambling, FEC etc. can be employed
to ensure security in the system,
* GSM offers several security services based on the
information stored in AUC and SIM. The security
services offered by GSM are
‘Security services
1. Access control and authentication
2. Confidentiality
‘3, Anonymity
(onFig. 1.10.7 : Security services
> 1. Access control and authentication
‘Access to the GSM network is allowed only through
user authentication process. For this first user needs to
have valid PIN to access the SIM and then using
challenge response scheme authentication is done in
‘mobile originated and mobile terminated calls.
> 2. Confidentiality
Once the authentication is done all the user data, voice
etc, are encrypted to provide confidentiality. It exists
only between MS and BTS.
> 3. Anonymity
‘+ User's real identity is never transmitted on air. Every
user is allocated with TMSI which is unique for each
call. And VLR can change TMSI at any time,
© These three services are achieved by three algorithms
in GSM network.
1... AB algorithm for authentication
(MSBTE-New Syllabus w.e academic year 2019-20) (D6-15)
msc
2, AS algorithm for encryption
3. AB algorithm for generation of a cipher key
1.10,4(A) Authentication using A3
Algorithm
Authentication is done with the help of SIM. SIM
stores authentication key Ki and the user IMSI.
Authentication is done by challenge response or request
response method between MS and BTS.
RAND random number is generated by AC
(access control) which acts as a challenge and SIM
responds to it by SRES (signed response).
AUC generates RAND, SRES and cipher key K, for
each IMSI received and then forwards this to HLR.
VLR may ask for these values from HLR.
‘This RAND is sent to SIM by VLR for authentication
purpose.
‘On network side as well as on SIM side algorithm A3
is carried out on the RAND and Ki. Then MS sends
SRES generated by SIM on air and VLR compares this,
received value with the one generated in the network.
If both the values matches, subscriber is allowed to
access the network otherwise he is denied the access.
Refer Fig. 1.10.8.
a)
mobile network
RAND {RAND Kj
aoa] feos
ed
om
=
eres
sis | es
(¢221)Fig. 1.10.8 : Subscriber's authentication
using A3 algorithm
[al rech-Neo Publications ..A SACHIN SHAH VentureBasics of PCS and GSI
Wireless and Mobile Network (MSBTE-6th — IF) PO.No. (1
Ye. 1.10.4(B) Data Encryption usin
[All the user information is always encrypred
European standard, Only manufactur
«Entire encryption is bi
© 64 bit Cipher key Ky is gener
K, and RAND. This is done by A8 alg
«Now encryption and decrypt
Based on K,, current TDMA frame number,
cers of the cellular devi
‘ased on encryption key or eipher key
ated using the values already SIM has
rithm, SIM and Network both calculates K, based on these values.
con is carried out using As algorithm and Ke,
As algorithm generates 114 bits. Thes
the information bits inthe normal GSM burst and then its transmitted. Same operation is carried at the network sg
data has no errors the modulo 2 addition of the received data ang
g AS and AB Algorithm
hefore itis sent on air, For encryption As algorithm is used whic,
i
ices has access to this algorithm
K which is never sent on air to maintain secrecy,
(received during authentication process) whig
¢ 114 bits are then modulo 2 ad,
the received Normal burst, If the received
al data sequence. This is decryption process. Refer Fig. 1.10.9.
generated encrypted data gives out the origin
SIM card
«| yee
AB
TDMA
trame number
AS
‘Mobile phone
Radio channel ”
Network
RAND
TDMA
me number
(se22)Fig. 1.10.9 : Data encryption using AS and A8 algorithms
110.5
+ Handover is related to the moving from one point to
another point within the same network. When the
movement is in another network occurs, it is known as
Roaming
roaming.
* The mobile must register on the
new netw
Le fork with its
+ IMSI attach : IMS! is communicated to the new
network. First location update message is conveyed t
new VLR. This is then conveyed to HLR. Once the
C : e
subscriber is authenticated, his record is deleted fr
the old VLR. om
Roaming allows MS movement s
seamlessly across
Bown ly across
sree Maw Gvilabus w.ef academic vear 2019-2m ine-16.
Location updating of the MS is done with the help:
MSC, VLR and HLR. HLR is given the informa
about the SS7 address of the new VLR. If *
subscriber is entitled to the service, the HLR sents!
subset of the subscriber's information needed for
control to the new VLR and old VLR registratio™
cancelled,
Roaming is of two types namely horizontal roa
and vertical roaming.
Horizontal roaming: It is between two networks
same family. For e,g, GSM to GSM roaming.
me Foaming: It is between two networks of
ifferent families. For e.g. GSM to CDMA roamWireless and Mobile Network (MSBTE-6th — IF)
tet NETWORK SIGNALING cM
Un Avs A Mt
ws BTS 1 BSC 1 MSC Ls
i i ‘Tom
ou |! i \
wm |e { ‘ [aa AR
; i | Jassae
t 1 An |
| aioe ‘| sz 2] LAPDm LAPDm
aro] \[ APO] waro || taro | $7 | Aad a
vaso |{[reao [rom |i [pow | rom | | [Pom U1 | interface interface
16164 Koils 64 vols! t
2,048 MoUs! Uni
ie alr interface
(genFig. 1.11.1: Protocol architecture for GSM signalling
showing various radio interfaces
‘There are three different interfaces present in GSM
system they are :
1. Uyy: Interconnection between MS and BTS
2. Agig Interconnection between BTS and BSC
3, A: Interconnection between BSC to MSC
W111 Um Interface
«In GSM network the interconnection between the
different subsystems are connected via wireless
channels. Signal processing through wireless channels
has to undergo various regulations and standards are set
vp for that
© The radio interface between MS and base transceiver
station is known as Um radio interface.
«The GSM radio interface depends on TDMA (Time
Division Multiple Access), FDD (Frequency Division
Duplexing). [TDMA : frequency is shared among
different users by dividing the time in slots. FDD : it
allows the use of two different frequencies for uplink
ie. from MS to BTS and downlink ie. BTS to MS.}
© Three layers :
1. Physical layer (L1)
2, Link access Protocol on D channel modified
(LAPDm) (L2)
3... The network layer (L3)
(MSBTE-New Syllabus w.e academic year 2019-20) (D6-15)
BTS
(s80)Fig, 1.11.2: Um interface protocol
1 Layer 1: The physical layer
Functions
Formation of bursts in 5 different formats.
Formation of TDMA frame by multiplexing of bursts.
‘Synchronisation with BTS with timing advance
technique.
Monitoring the quality of channel on the downlink
path
‘Identification of idle channels.
Interfacing to the data Tink layer and radio resource
‘management sublayer for traffic management.
Eneryption and decryption of data between MS and
BSS using FEC (Forward Error Correction).
Digital modulation with the use of GMSK modulation
scheme.
Layer 2: LAPDm layer
‘This is based on ISDN LAPD protocol.
Functions
1
2.
3.
4
Reliable data transfer between GSM network and MS.
Arrangement of sequencing of data frames:
Flow control.
‘Segmentation and reassembly of the data,
-Tech-Neo Publications ...A SACHIN SHAH VentureWit
ireless and Mobile Network (MSBTE:
LAPDm has to follow frame structures as there is no
buffering between layer 1 and layer 2 in Um.
S$ Layer 3: The network layer
It consists of three sublayers :
3.
1
2
a
-
1.
2.
3.
RR : Radio Resource Management Sublayer
MM : Mobility Management Sublayer
CM : Call Management Sublayer
RR
It is used for setup, maintenance and disconnection of
radio channels. It can directly access the physical layer
and provides reliable communication path for upper
layers.
MM
It supports the functions of location updating,
authentication and encryption, allocation of TMSI. It
also supports reliable connection to upper layer,
cM
Tt consists of three functional entities namely :
Call control (CC) : Support for end to end call setup
and management,
SMS (Short Message Service) : Transfers and manages
SMS services.
Supplementary service (SS) : Manages supplementary
service,
1.11.2 Ay, Interface
1t provides the interface between BTS and MSC.
Functions
Radio channel management.
Traffic channel management,
Terrestrial channel management,
1 supports two different links :
64 Kbps link (full rate or half rate
Carrying speech or
user data)
16 kbps link (control inform:
tation link between BSC.
BTS and BTS-Msc)
a
3.
Basics of PCS and GSM...Pg. No,
Three layers are present in thi
1, The physical layer +
modulation purposes.
The LAPD layer
Network layer - RR’ is used, it is omly par y
radio resource “management sublayer. Al)
functions of RR’ are supported by BTsy
(BTS management).
typically uses Poy 5,
2
3.
Transparent messages and non transparent message,
between MS and BSC/MSC are handled by the traf
‘management.
Transparent messages : BTS analysis is not required
‘Non-transparent messages : BTS analysis is required,
1.11.3 A Interface
It provides the interconnection between BSS and MSc.
‘SS7 is used for communication between MS and MSC.
This interface supports identification of channel
timeslots being serviced by BSS.
‘The messaging required within the network to enabh
handover etc to be undertaken is carried over th
interface,
1.11.4 Interfaces used within NSS
B Interface
Itinterconnects MSC and VLR. It is
interface,
Protocol used : MAP/B protocol.
Tt is used to access data Tegarding MS located in MSt
area,
purely an intern:
C interface
Ttinterconnects HLR and GMsc,
Protocol used : MAP/C
The MSC may o
ptionally forward billing informatio
to the HLR aft
fer the call is completed and clear
D Interface
Minterconnects HLR and VLR.
Prot MAP/D
(MSBTE-New Syllabus wet academic year 2019-20) (9 15)
aeWireless and Mobile Network (MSBTE-6th
IF)
1t supports functions like exchange of the data related
to the location of the ME and to the management of the
subscriber.
‘The communications along this interface are used to
confirm the status of the IMEI of the ME gaining
‘access to the network,
4, E Interface 6. G interface
‘*_Itinterconnects two MSCs. © Itinterconnects two VLRs of different MSCs.
© Protocol used : MAP/E © Protocol used : MAP/G
«The E interface exchanges data related to handover | + It is used to access subscriber information. e.g. during a
between two MSCs. location update procedure,
5. Finterface 7. Hinterface
© Itinterconnects MSC and EIR. # Itinterconnects MSC and SMSC (SMS center).
* Protocol used : MAP/F. ‘* Protocol used : MAP/H
‘Iti used to support SMS services.
8. Tinterface
Itinterconnects MSC and ME.
Itis used for exchange of transparent messages.
Refer Fig.
um
11.3, it shows all the radio interfaces used in GSM architecture.
terface
Abis
Aintertaco
BTS
:
(609Fig. 1.113 : GSM architecture showing radio interfaces between various functional entities
«Chapter Ends
goo